Welcome to VOX-Pol’s online Library, a research and teaching resource, which collects in one place a large volume of publications related to various aspects of violent online political extremism.
Our searchable database contains material in a variety of different formats including downloadable PDFs, videos, and audio files comprising e-books, book chapters, journal articles, research reports, policy documents and reports, and theses.
All open access material collected in the Library is easy to download. Where the publications are only accessible through subscription, the Library will take you to the publisher’s page from where you can access the material.
We will continue to add more material as it becomes available with the aim of making it the most comprehensive online Library in this field.
If you have any material you think belongs in the Library—whether your own or another authors—please contact us at firstname.lastname@example.org and we will consider adding it to the Library. It is also our aim to make the Library a truly inclusive multilingual facility and we thus welcome contributions in all languages.
Understanding and Influencing Public Support for Insurgency and Terrorism
|2012||Davis, P.K., Larson, E.V., Haldeman, Z., Oguz, M. and Rana, Y.||Book|
|The monograph focuses on public support for insurgency and terrorism and how it can be influenced. It is organised around the testing and refinement of conceptual models that seek to integrate much of what is known from relevant social science about public support.|
An Analysis of Interactions Within and Between Extreme Right Communities in Social Media
|2012||O’Callaghan, D., Greene, D., Conway, M., Carthy, J. and Cunningham, P.||Report|
|Many extreme right groups have had an online presence for some time through the use of dedicated websites. This has been accompanied by increased activity in social media websites in recent years, which may enable the dissemination of extreme right content to a wider audience. In this paper, we present exploratory analysis of the activity of a selection of such groups on Twitter, using network representations based on reciprocal follower and mentions interactions. We find that stable communities of related users are present within individual country networks, where these communities are usually associated with variants of extreme right ideology. Furthermore, we also identify the presence of international relationships between certain groups across geopolitical boundaries.|
Mobilisation and Violence in the New Media Ecology: the Dua Khalil Aswad and Camilia Shehata Cases
|2012||Al-Lamia, M., Hoskins, A. and O'Loughlin, B.||Journal|
|This article examines two cases in which political groups sought to harness the new media ecology to mobilise and justify acts of violence to public audiences and to supporters. In each case, a woman's suffering is presented and instrumentalised. However, the new media ecology offers an increasingly irregular economy of media modulation: digital footage may emerge today, in a year or never, and it may emerge anywhere to anyone. The cases analysed here allow for reflection on the tension between contingency and intentionality as that irregular economy brings uncertainty for the political actors involved. Dua Khalil Aswad, an Iraqi teenager of the Yazidi faith, was stoned to death by a Yazidi mob consisting of tens of men, mostly her relatives. One Yazidi uploaded a film of the killing. This led to violent reprisals against the Yazidis. Camilia Shehata is a young Coptic Egyptian who, after allegedly converting to Islam, was returned to her church with the help of Egyptian security forces and kept in hiding despite public protests. Extremists in Iraq and Egypt seized on the Shehata case to justify violence against Christians. In both instances, the irregular emergence of digital content and its remediation through these media ecologies enabled distributed agency in ways that empowered and confounded states, terrorists and citizens.|
Political Extremism in Denmark: A Pre-Investigation for Mapping of Right-Wing and Left-Wing Extremism
|2012||Holmsted Larsen, C.||Report|
|The purpose of this status report is to create an overview of the challenges related to right-wing and left-wing extremism in Denmark. The report will form part of a more comprehensive mapping launched partly with a view to concretising and targeting the preventive effort. The present report is based on existing and ongoing research in the area. It is a concrete and fact-based report which aims to identify where in present-day Denmark extreme political problems exist – and what kind of issues the Danish society is facing as a result of this. The report is not a mapping or an exhaustive account of the right-wing and left-wing extremist environments, but rather an attempt to establish a knowledge base which may serve as a foundation for such an investigation. Thus, the report reflects existing research on political extremism in Denmark, which is still relatively limited in scope. Consequently, the report also reflects the researcher‟s own observations and analyses of current developments in political extremism. Furthermore, the future mapping will be based on a quantitative investigation.|
Politics and Media 13 February 2012
|Part 1 of a panel discussion of February 2012 report by British House of Commons describing the internet as 'a fertile breeding ground for terrorism'. Originally uploaded by 1IslamChannel on 28 March 2012.|
|2012||El Difraoui, A.||Article|
|Spätestens seit der Kosovo-Albaner Arid Uka Anfang März 2011 am Frankfurter Flughafen zwei US-Soldaten tötete, hat das Bewusstsein für die Gefahren jihadistischer Internetpropaganda stark zugenommen. Der 21-Jährige erklärte, zu der Tat habe ihn ein Internetvideo bewogen. Wie soll man in Deutschland mit der Propaganda im Internet umgehen und ihrem radikalisierenden Einfluss entgegensteuern? Sie völlig aus dem Netz zu entfernen ist unmöglich. Ohnehin sollte eine gewisse Anzahl für durchschnittliche Internetnutzerinnen und -nutzer schwer zugänglicher Webseiten toleriert werden, um hier relevante Informationen zu gewinnen.|
Bei dem in dieser Studie vorgeschlagenen Konzept sollte die Bundesregierung federführend in Kooperation mit den Landesregierungen vielversprechende Initiativen identifizieren oder anregen, sie finanziell und logistisch fördern und lose, aber effizient koordinieren. Um diesen schwierigen Balanceakt zu bewältigen, sollte eine unabhängige Struktur geschaffen werden, etwa in Form einer Stiftung oder eines Instituts.
Von al-Zarqawi bis al-Awlaki: Das Internet als neue Form des radikalen Milieus.
|Chapter in Stefan Malthaner and Peter Waldmann (eds.) Radikale Milieus: Das soziale Umfeld terroristischer Gruppen.|
What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press
|2012||Conway, M. and McInerney, L.||Journal|
|The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts.|
Exploring the Form and Function of Dissident Irish Republican Online Discourses
|2012||Bowman-Grieve, L. and Conway, M.||Journal|
|This article seeks to contribute to broadening the focus of research in the area of violent online political extremism by examining the use of the internet by dissident Irish Republicans and their supporters. The argument here is not that the internet substitutes face-to-face contacts amongst Irish Republicans, including violent dissidents, nor that it currently plays a central role in processes of radicalisation into violent dissident groups, but that it has an important support function in terms of providing an ‘always-on’ space for discussion, consumption, and production of Irish Republicanism and thus a potentially useful educative role in terms of introducing ‘newbies’ to violent dissident Republicanism while also acting as a ‘maintenance’ space for the already committed. This exploratory study considers the importance of these functions in the context of repeated suggestions that the dissidents have no significant support-base or constituency as internet activity certainly gives the appearance of some such support.|
Digital Terrorism and Hate 2012: The Power of Social Networking in the Digital Age
|2012||Abraham, R. and Rick Eaton, C.||Report|
|Analysis of 'digital terrorism' and hate on the Internet|
New Approaches to the Analysis of Jihadism: Online and Offline
|This volume is a result of a research project at the University of Vienna (Austria). The project “Jihadism online” aims at a multi-dimensional analysis of online presence of the transnational tendency often called Jihadism.|
The Use of the Internet for Terrorist Purposes
|2012||United Nations Office on Drugs and Crime (UNODC)||Policy|
|Terrorism, in all its manifestations, affects us all. The use of the Internet to further terrorist purposes disregards national borders, amplifying the potential impact on victims. By highlighting cases and best practices that respond to this unique challenge, the present publication has two aims: first, to promote a better understanding of the ways in which communications technologies may be misused in furtherance of acts of terrorism and, second, to increase collaboration among Member States, so that effective criminal justice responses to this transnational challenge can be developed.|
Inside the EDL: Populist Politics in a Digital Age
|2011||Bartlett, J. and Littler, M.||Report|
|The English Defence League (EDL) is the biggest populist street movement in a generation. Yet the make-up of the group and what its members believe remain a mystery because it has no formal joining procedures or membership list and much of its activity takes place online. The collection of large amounts of data from social media presents new opportunities for social research to understand the relationship between off- and online activity. As more movements combine – and blur – virtual and real protest, these questions will become increasingly urgent and important. These surveys, collected through Facebook using a new methodology, offer new ways forward in exploring this challenge.|
As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad
|CSR is pleased to announce the release of its newest report, As American As Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad, by Research Fellow Alexander Meleagrou-Hitchens. This study provides the first forensic analysis of Anwar al-Awlaki’s work, which tracks his ideological path from a supposedly moderate preacher to an al-Qaeda recruiter.|
Countering Violent Extremism: Scientific Methods and Strategies
|This report represents a distillation of current Social, Behavioural and Economic research findings on violent extremism: What is the cultural basis for violent extremism and radicalization? What motivates individuals and groups to violence, and how is that risk measured? How does our understanding of these findings educate the mitigation of extremism? Can it be prevented or reversed? These and other topics are outlined here to open a forward-looking dialog in the research and policy community that will be crucial to formulating future research direction and for addressing this pressing national concern.|
Facebook jihad: A case study of recruitment discourses and strategies targeting a Western female
|Recent years has seen a trend towards the increasing specificity of recruitment targets for global jihad. This paper is a case study of the discourses used to recruit a Western female who originally subscribed to an antigovernment, anti-New World Order ideology. Categorising using grounded theory analysis found that female recruiters tapped into the interest of their target subject and then shifted her towards sympathy and commitment to radical Islam. This was achieved through media saturation of Western aggression against Muslims coupled with an ideology that promotes the need to fight and resist. Subject material to which the recruit was directed was carefully controlled and initially deemphasized the Qur’an in favour of mujahedeen narratives and the teachings of Anwar al-Awlaki. Overall, the research supported a sophisticated narrowcasting strategy that was carefully developed primarily by female recruiters.|
Empowering Local Partners To Prevent Violent Extremism In The United States
|2011||The White House||Policy|
|United States Strategy for Countering Violent Extremism Strategy 2011|
Youth Online and at Risk: Radicalisation Facilitated by the Internet
|2011||Royal Canadian Mounted Police||Report|
|While the internet provides access to rich educational experiences, great entertainment, and the chance to connect with friends around the clock, it also creates a number of risks that young people, parents, and guardians need to be aware of. There are the commonly known concerns of identity theft, online predators, and cyber-bullying but there is another issue that we need to collectively work to address— Radicalisation to violence. This informational resource strives to increase the awareness of how the internet is being used to radicalise and recruit youth in North America.|
Online Territories of Terror: Utilizing the Internet for Jihadist Endeavors
|An introduction to Jihadism online|
A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists
|The troublesome question of how and whether to consider what are commonly referred to as Lone Wolf terrorists within the broader roster of terrorist groups is something that has regularly confounded security analysts for a variety of reasons. This article attempts to create some sort of typology to start to define the group, with specific reference to the instances of Lone Wolves (or Lone Wolf Packs, an admittedly paradoxical choice of words that is defined in the article as small, isolated groups of individuals involved in terrorism) who claim to adhere to an extremist Islamist ideology. The article offers four subsets to the definition, drawing upon a detailed analysis of a variety of different plots in Europe and North America: Loner, Lone Wolf, Lone Wolf Pack, and Lone Attacker. The purpose of the article is to offer some preliminary thoughts on the issue of Lone Wolves, and start a process towards deeper understanding and closer analysis of the phenomenon. This is of particular salience given the frequency with which security analysts cite the phenomenon as a threat and the increasing way in which Al Qaeda ideologues refer to it.|